default search action
Shahram Babaie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Gholam Hossein Abdi, Amir Hossein Refahi Sheikhani, Sohrab Kordrostami, Armin Ghane, Shahram Babaie:
A novel selfish node detection based on reputation and game theory in Internet of Things. Computing 106(1): 81-107 (2024) - [j20]Elham Ebrahimpour, Shahram Babaie:
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review. Int. J. Inf. Sec. 23(3): 1583-1602 (2024) - [j19]Hossein Zangoulechi, Shahram Babaie:
An adaptive traffic engineering approach based on retransmission timeout adjustment for software-defined networks. J. Ambient Intell. Humaniz. Comput. 15(1): 739-750 (2024) - [j18]Hamed Ghasemi, Shahram Babaie:
A new intrusion detection system based on SVM-GWO algorithms for Internet of Things. Wirel. Networks 30(4): 2173-2185 (2024) - 2023
- [j17]Zohre Majidian, Shiva TaghipourEivazi, Bahman Arasteh, Shahram Babaie:
An intrusion detection method to detect denial of service attacks using error-correcting output codes and adaptive neuro-fuzzy inference. Comput. Electr. Eng. 106: 108600 (2023) - [j16]Zamineh Najafi, Shahram Babaie:
A lightweight hierarchical key management approach for internet of things. J. Inf. Secur. Appl. 75: 103485 (2023) - [j15]Elham Ebrahimpour, Shahram Babaie:
A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things. Peer Peer Netw. Appl. 16(4): 1900-1915 (2023) - 2022
- [j14]Fereshteh Ghasemi, Shahram Babaie:
A lightweight secure authentication approach based on stream ciphering for RFID-based Internet of Things. Comput. Electr. Eng. 102: 108288 (2022) - [j13]Nasim Razzaghi, Shahram Babaie:
A new selfish thing detection method based on Voronoi diagram for Internet of Things. J. Supercomput. 78(6): 8389-8408 (2022) - 2021
- [j12]Harir Seddiqi, Shahram Babaie:
A New Protection-Based Approach for Link Failure Management of Software-Defined Networks. IEEE Trans. Netw. Sci. Eng. 8(4): 3303-3312 (2021) - [j11]Amin Hodaei, Shahram Babaie:
A Survey on Traffic Management in Software-Defined Networks: Challenges, Effective Approaches, and Potential Measures. Wirel. Pers. Commun. 118(2): 1507-1534 (2021) - 2020
- [j10]Mahdi Mojed Gharamaleki, Shahram Babaie:
A New Distributed Fault Detection Method for Wireless Sensor Networks. IEEE Syst. J. 14(4): 4883-4890 (2020) - [j9]Ali Eslami Varjovi, Shahram Babaie:
Green Internet of Things (GIoT): Vision, applications and research challenges. Sustain. Comput. Informatics Syst. 28: 100448 (2020) - [j8]Mohammad Afrashteh, Shahram Babaie:
A Route Segmented Broadcast Protocol Based on RFID for Emergency Message Dissemination in Vehicular Ad-Hoc Networks. IEEE Trans. Veh. Technol. 69(12): 16017-16026 (2020)
2010 – 2019
- 2019
- [j7]Homa Hasani, Shahram Babaie:
Selfish node detection in ad hoc networks based on fuzzy logic. Neural Comput. Appl. 31(10): 6079-6090 (2019) - [j6]Somaieh Zakariayi, Shahram Babaie:
DEHCIC: A distributed energy-aware hexagon based clustering algorithm to improve coverage in wireless sensor networks. Peer-to-Peer Netw. Appl. 12(4): 689-704 (2019) - [j5]Shahram Babaie, Ali Sadoghifar, Ali Newaz Bahar:
Design of an Efficient Multilayer Arithmetic Logic Unit in Quantum-Dot Cellular Automata (QCA). IEEE Trans. Circuits Syst. II Express Briefs 66-II(6): 963-967 (2019) - 2018
- [j4]Ayda Vatankhah, Shahram Babaie:
An optimized Bidding-based coverage improvement algorithm for hybrid wireless sensor networks. Comput. Electr. Eng. 65: 1-17 (2018) - [j3]Vajiheh Hajisalem, Shahram Babaie:
A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput. Networks 136: 37-50 (2018) - [j2]Sanaz Nobahary, Shahram Babaie:
A Credit-based Method to Selfish Node Detection in Mobile Ad-hoc Network. Appl. Comput. Syst. 23(2): 118-127 (2018) - 2013
- [j1]Shahram Babaie, Afsaneh Khosrohosseini, Ahmad Khadem-Zadeh:
A new self-diagnosing approach based on petri nets and correlation graphs for fault management in wireless sensor networks. J. Syst. Archit. 59(8): 582-600 (2013) - 2012
- [c3]Ramin Ahmadi, Ahad Jahangiry, Shahram Babaie, Maryam Kordlar:
Localization in wireless sensor network by using mobile stations. BHI 2012: 277-280 - [i3]Shahram Babaie, Seyed Sajad Pirahesh:
Hole Detection for Increasing Coverage in Wireless Sensor Network Using Triangular Structure. CoRR abs/1203.3772 (2012) - 2011
- [c2]Shahram Babaie, Ali Ranjideh Rezaie, Saeed Rasouli Heikalabad:
DFDM: Decentralized Fault Detection Mechanism to Improving Fault Management in Wireless Sensor Networks. DICTAP (1) 2011: 685-692 - [i2]Saeid Bahanfar, Ladan Darougaran, Helia Kousha, Shahram Babaie:
Reliable Communication in Wireless Body Area Sensor Network for Health Monitoring. CoRR abs/1112.0393 (2011) - 2010
- [i1]Shahram Babaie, Ahmad Khadem Zadeh, Ali Hosseinalipour:
New clustering method to decrease probability of failure nodes and increasing the lifetime in WSNs. CoRR abs/1003.1472 (2010)
2000 – 2009
- 2009
- [c1]Shahram Babaie, Ahmad Khadem-Zadeh, Seyed Hasan Es-hagi, Nima Jafari Navimipour:
Double Bits Error Correction Using CRC Method. SKG 2009: 254-257
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint